نتایج جستجو برای: 18911001891100total increase in man

تعداد نتایج: 17012179  

Journal: :I. J. Network Security 2016
Mohamad Badra Sherali Zeadally

Recent advances in hardware, software, computing, and communication technologies have enabled the design and deployment of a smarter, interactive, dynamic 21st century electrical grid, also known as the smart grid. The bi-directional flow of information between the customer premise and the utility provider opens up several privacy challenges that must be addressed. We describe possible man-in-t...

2011

This paper is the result of a study which analyzes the characteristics of mobile data with regard to both amount and content of the data collected. It will be shown what information is revealed through a man-in-the-middle attack on an unjailbroken iPhone 3GS within one week of internet usage. The results will reveal that the average transfer size of a datastream is very small in comparison to t...

Journal: :IACR Cryptology ePrint Archive 2008
Julien Bringer Hervé Chabanne

Since the introduction at Crypto’05 by Juels and Weis of the protocol HB, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security. We propose here a new approach to achieve resistance against Man-in-The-Middle attacks. Our requirements – in terms of extra communications and hardware – are surprisingly low.

Journal: :IACR Cryptology ePrint Archive 2010
Junfeng Fan Jens Hermans Frederik Vercauteren

In this paper we show how to break the most recent version of EC-RAC with respect to privacy. We show that both the ID-Transfer and ID&PWD-Transfer schemes from EC-RAC do not provide the claimed privacy levels by using a man-in-the-middle attack. The existence of these attacks voids the presented privacy proofs for EC-RAC.

Journal: :I. J. Network Security 2005
Cheng-Ying Yang Cheng-Chi Lee Shu-Yin Hsiao

In 2003, Novikov and Kiselev proposed an authentication of the user from the remote autonomous object. In this article, we shall show that the Novikov-Kiselev scheme cannot against a man-in-the-middle attack.

2012
Frank Emmert-Streib Ricardo de Matos Simoes Shailesh Tripathi Galina V. Glazko Matthias Dehmer

In this paper, we present a Bayesian approach to estimate a chromosome and a disorder network from the Online Mendelian Inheritance in Man (OMIM) database. In contrast to other approaches, we obtain statistic rather than deterministic networks enabling a parametric control in the uncertainty of the underlying disorder-disease gene associations contained in the OMIM, on which the networks are ba...

2009
Joshua Sunshine Serge Egelman Hazim Almuhimedi Neha Atri Lorrie Faith Cranor

Web users are shown an invalid certificate warning when their browser cannot validate the identity of the websites they are visiting. While these warnings often appear in benign situations, they can also signal a man-in-the-middle attack. We conducted a survey of over 400 Internet users to examine their reactions to and understanding of current SSL warnings. We then designed two new warnings us...

2013
Richard C. Kiefer Robert R. Freimuth Christopher G Chute Jyotishman Pathak

Gene Wiki Plus (GeneWiki+) and the Online Mendelian Inheritance in Man (OMIM) are publicly available resources for sharing information about disease-gene and gene-SNP associations in humans. While immensely useful to the scientific community, both resources are manually curated, thereby making the data entry and publication process time-consuming, and to some degree, error-prone. To this end, t...

Journal: :IACR Cryptology ePrint Archive 2014
Ashok Kumar Das

In 2013, Althobaiti et al. proposed an efficient biometricbased user authentication scheme for wireless sensor networks. We analyze their scheme for the security against known attacks. Though their scheme is efficient in computation, in this paper we show that their scheme has some security pitfalls such as (1) it is not resilient against node capture attack, (2) it is insecure against imperson...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید